New do-it-yourself cyber-extortion kits make it easy.

Since its invention in the mid-2000s, ransomware has become the world’s premier cyber-security threat. Typically gaining entry to a system via bogus emails or notifications, this malware enables criminals to capture a system’s data and demand payment for its release. Read More...

The TIA (Transportation Intermediaries Association) Conference and Tradeshow always has incredible education series. This year we were able to not only attend the conference but our CEO, Chuck Cook, RenovoData joined an industry panel of experts, including Ben Barnes, IT Director at McLeod Software, Chris Hauser, Vice President, Travelers Risk Control, Cyber Program and moderator Bill Cassidy, Senior Editor, Trucking & Domestic Transport.Read more and view the video.

Data disaster comes in many forms, from hurricanes to ransomware attacks, and security is always a major issue. But no matter the source of the problem, recovery will be faster, easier, cheaper and less traumatic with a solid disaster recovery plan in place.

So will your existing plan be effective in the event of disaster? If it is poorly planned, is not updated to cover ongoing changes, or is not regularly and rigorously tested, the answer is no.

In December 2016, RenovoData were featured in the leading publication from the Transport Intermediaries Association, The Logistics Journal. The article provides expert-level detail on helping 3PL and Trucking Companies to choose the right disaster recovery solution.Learn more and read the full article.

In November 2016, RenovoData were once again featured in the leading publication from the Transport Intermediaries Association, The Logistics Journal. The article, authored by our own Data Protection Expert, Chuck Cook, provides expert-level detail on Network Security (Simple Concept, Complex Reality) including security-risk lingo (vulnerabilities, threats, breaches, etc), planning a security program, reduction of human error, what to protect, knowing your enemies, and their weapons! And, of course the importance and value of testing.Learn more and read the full article.

The cost of server downtime can be overwhelming. To estimate just how expensive it could be for your business, take a moment to calculate your potential losses. You’ve probably taken steps to guard against major hardware failure, but if you’re relying solely on a data backup solution to recover your server, you might be setting yourself up for future problems. Read more about protecting your server and using the correct tools.

Effective security demands the strongest possible protective measures, encompassing every aspect of the network. Although technical components are separate items and the organization itself comprises various aspects of the security process, all are bound together to form a whole, like the layers of an onion. Both technical and human components can be at risk. Only by implementing universal security policies and procedures can the entire system be safeguarded. Learn More.

Data protection is nothing less than business protection, and to be effective it must be as nearly invincible as possible. Yet even the most technically sophisticated organizations, those familiar with the fine points of data backup, can make a particularly dangerous mistake: not noticing a single point of failure. This means any significant part of a system that is without redundancy. If one major component ceases to function, it can set off a cascade of collapse and the system can stop cold.

In August, RenovoData again were once again featured in the leading publication from the Transport Intermediaries Association, The Logistics Journal. The article, written by our own Chuck Cook, provides expert-level detail on recent downtime scenarios that have made the news as well as looking at the possible assessments a company can take to gauge their potential downtime. Learn more and read the full article.